CLEANUP: tree-wide: replace free(x);x=NULL with ha_free(&x)

This makes the code more readable and less prone to copy-paste errors.
In addition, it allows to place some __builtin_constant_p() predicates
to trigger a link-time error in case the compiler knows that the freed
area is constant. It will also produce compile-time error if trying to
free something that is not a regular pointer (e.g. a function).

The DEBUG_MEM_STATS macro now also defines an instance for ha_free()
so that all these calls can be checked.

178 occurrences were converted. The vast majority of them were handled
by the following Coccinelle script, some slightly refined to better deal
with "&*x" or with long lines:

  @ rule @
  expression E;
  @@
  - free(E);
  - E = NULL;
  + ha_free(&E);

It was verified that the resulting code is the same, more or less a
handful of cases where the compiler optimized slightly differently
the temporary variable that holds the copy of the pointer.

A non-negligible amount of {free(str);str=NULL;str_len=0;} are still
present in the config part (mostly header names in proxies). These
ones should also be cleaned for the same reasons, and probably be
turned into ist strings.
diff --git a/include/haproxy/bug.h b/include/haproxy/bug.h
index a2cf6ba..4f0df6d 100644
--- a/include/haproxy/bug.h
+++ b/include/haproxy/bug.h
@@ -73,6 +73,17 @@
 #define BUG_ON(cond)
 #endif
 
+/* more reliable free() that clears the pointer */
+#define ha_free(x) do {							\
+		typeof(x) __x = (x);					\
+		if (__builtin_constant_p((x)) || __builtin_constant_p(*(x))) { \
+			/* provoke a build-time error */		\
+			extern volatile int call_to_ha_free_attempts_to_free_a_constant; \
+			call_to_ha_free_attempts_to_free_a_constant = 1; \
+		}							\
+		free(*__x);						\
+		*__x = NULL;						\
+	} while (0)
 
 #if defined(DEBUG_MEM_STATS)
 #include <stdlib.h>
@@ -129,6 +140,26 @@
 	free(__x);							\
 })
 
+#undef ha_free
+#define ha_free(x)  ({							\
+	typeof(x) __x = (x);						\
+	static struct mem_stats _ __attribute__((used,__section__("mem_stats"))) = { \
+		.file = __FILE__, .line = __LINE__,			\
+		.type = MEM_STATS_TYPE_FREE,				\
+	};								\
+	__asm__(".globl __start_mem_stats");				\
+	__asm__(".globl __stop_mem_stats");				\
+	if (__builtin_constant_p((x)) || __builtin_constant_p(*(x))) {  \
+		/* provoke a build-time error */			\
+		extern volatile int call_to_ha_free_attempts_to_free_a_constant; \
+		call_to_ha_free_attempts_to_free_a_constant = 1;	\
+	}								\
+	if (*__x)							\
+		_HA_ATOMIC_ADD(&_.calls, 1);				\
+	free(*__x);							\
+	*__x = NULL;							\
+})
+
 #undef malloc
 #define malloc(x)  ({							\
 	size_t __x = (x);						\
diff --git a/src/51d.c b/src/51d.c
index fda0171..f36f5fa 100644
--- a/src/51d.c
+++ b/src/51d.c
@@ -728,7 +728,7 @@
 #endif
 	fiftyoneDegreesDataSetFree(&global_51degrees.data_set);
 
-	free(global_51degrees.data_file_path); global_51degrees.data_file_path = NULL;
+	ha_free(&global_51degrees.data_file_path);
 	list_for_each_entry_safe(_51d_prop_name, _51d_prop_nameb, &global_51degrees.property_names, list) {
 		LIST_DEL(&_51d_prop_name->list);
 		free(_51d_prop_name);
diff --git a/src/acl.c b/src/acl.c
index b65852f..cf7dd91 100644
--- a/src/acl.c
+++ b/src/acl.c
@@ -305,8 +305,7 @@
 				goto out_free_smp;
 			}
 		}
-		free(ckw);
-		ckw = NULL;
+		ha_free(&ckw);
 	}
 	else {
 		/* This is not an ACL keyword, so we hope this is a sample fetch
diff --git a/src/arg.c b/src/arg.c
index 982bab5..31e7e02 100644
--- a/src/arg.c
+++ b/src/arg.c
@@ -399,8 +399,7 @@
 	 * in between, there is no arg at all.
 	 */
 	if (!pos) {
-		free(*argp);
-		*argp = NULL;
+		ha_free(argp);
 	}
 
 	if (pos >= min_arg)
diff --git a/src/auth.c b/src/auth.c
index 5d74f7a..a88e6b2 100644
--- a/src/auth.c
+++ b/src/auth.c
@@ -199,8 +199,7 @@
 				curuser->u.groups = grl;
 			}
 
-			free(ag->groupusers);
-			ag->groupusers = NULL;
+			ha_free(&ag->groupusers);
 		}
 
 #ifdef DEBUG_AUTH
diff --git a/src/cache.c b/src/cache.c
index 0e2e3f9..acd6872 100644
--- a/src/cache.c
+++ b/src/cache.c
@@ -2058,8 +2058,7 @@
 		return err_code;
 	}
 out:
-	free(tmp_cache_config);
-	tmp_cache_config = NULL;
+	ha_free(&tmp_cache_config);
 	return err_code;
 
 }
diff --git a/src/cfgparse-listen.c b/src/cfgparse-listen.c
index 34816c5..1a39c2f 100644
--- a/src/cfgparse-listen.c
+++ b/src/cfgparse-listen.c
@@ -629,7 +629,7 @@
 
 		curproxy->ck_opts = 0;
 		curproxy->cookie_maxidle = curproxy->cookie_maxlife = 0;
-		free(curproxy->cookie_domain); curproxy->cookie_domain = NULL;
+		ha_free(&curproxy->cookie_domain);
 		free(curproxy->cookie_name);
 		curproxy->cookie_name = strdup(args[1]);
 		curproxy->cookie_len = strlen(curproxy->cookie_name);
@@ -975,8 +975,7 @@
 		if (alertif_too_many_args(1, file, linenum, args, &err_code))
 			goto out;
 
-		free(curproxy->server_state_file_name);
-		curproxy->server_state_file_name = NULL;
+		ha_free(&curproxy->server_state_file_name);
 
 		if (*(args[1]) == 0 || strcmp(args[1], "use-backend-name") == 0)
 			curproxy->server_state_file_name = strdup(curproxy->id);
@@ -2666,8 +2665,7 @@
 
 		/* we must first clear any optional default setting */
 		curproxy->conn_src.opts &= ~CO_SRC_TPROXY_MASK;
-		free(curproxy->conn_src.iface_name);
-		curproxy->conn_src.iface_name = NULL;
+		ha_free(&curproxy->conn_src.iface_name);
 		curproxy->conn_src.iface_len = 0;
 
 		sk = str2sa_range(args[1], NULL, &port1, &port2, NULL, NULL,
diff --git a/src/cfgparse-ssl.c b/src/cfgparse-ssl.c
index faacc0e..6af1328 100644
--- a/src/cfgparse-ssl.c
+++ b/src/cfgparse-ssl.c
@@ -106,8 +106,7 @@
 		ssl_load_global_issuer_from_BIO(in, fp, &warn);
 		if (warn) {
 			ha_warning("%s", warn);
-			free(warn);
-			warn = NULL;
+			ha_free(&warn);
 		}
 	next:
 		if (in)
@@ -1467,8 +1466,7 @@
 static int srv_parse_no_check_ssl(char **args, int *cur_arg, struct proxy *px, struct server *newsrv, char **err)
 {
 	newsrv->check.use_ssl = -1;
-	free(newsrv->ssl_ctx.ciphers);
-	newsrv->ssl_ctx.ciphers = NULL;
+	ha_free(&newsrv->ssl_ctx.ciphers);
 	newsrv->ssl_ctx.options &= ~global_ssl.connect_default_ssloptions;
 	return 0;
 }
@@ -1497,8 +1495,7 @@
 	if (newsrv->use_ssl == 1)
 		ssl_sock_init_srv(newsrv);
 	else {
-		free(newsrv->ssl_ctx.ciphers);
-		newsrv->ssl_ctx.ciphers = NULL;
+		ha_free(&newsrv->ssl_ctx.ciphers);
 	}
 	newsrv->use_ssl = -1;
 	return 0;
diff --git a/src/cfgparse.c b/src/cfgparse.c
index 247b3c4..2d712a4 100644
--- a/src/cfgparse.c
+++ b/src/cfgparse.c
@@ -1081,14 +1081,10 @@
 
 void free_email_alert(struct proxy *p)
 {
-	free(p->email_alert.mailers.name);
-	p->email_alert.mailers.name = NULL;
-	free(p->email_alert.from);
-	p->email_alert.from = NULL;
-	free(p->email_alert.to);
-	p->email_alert.to = NULL;
-	free(p->email_alert.myhostname);
-	p->email_alert.myhostname = NULL;
+	ha_free(&p->email_alert.mailers.name);
+	ha_free(&p->email_alert.from);
+	ha_free(&p->email_alert.to);
+	ha_free(&p->email_alert.myhostname);
 }
 
 
@@ -1816,8 +1812,7 @@
 		err_code |= ERR_ALERT | ERR_FATAL | ERR_ABORT;
 	}
 err:
-	free(cfg_scope);
-	cfg_scope = NULL;
+	ha_free(&cfg_scope);
 	cursection = NULL;
 	free(thisline);
 	free(outline);
@@ -1986,8 +1981,7 @@
 			 * allocated yet) but let's skip them.
 			 */
 			if (curproxy->table) {
-				free((void *)curproxy->table->peers.name);
-				curproxy->table->peers.name = NULL;
+				ha_free(&curproxy->table->peers.name);
 				curproxy->table->peers.p = NULL;
 			}
 			continue;
@@ -2209,8 +2203,7 @@
 				cfgerr++;
 			}
 			if (clear) {
-				free(curproxy->check_command);
-				curproxy->check_command = NULL;
+				ha_free(&curproxy->check_command);
 			}
 		}
 
@@ -2219,8 +2212,7 @@
 				ha_warning("config : '%s' will be ignored for %s '%s' (requires 'option external-check').\n",
 					   "external-check path", proxy_type_str(curproxy), curproxy->id);
 				err_code |= ERR_WARN;
-				free(curproxy->check_path);
-				curproxy->check_path = NULL;
+				ha_free(&curproxy->check_path);
 			}
 		}
 
@@ -2606,8 +2598,7 @@
 			LIST_ADDQ(&curproxy->uri_auth->http_req_rules, &rule->list);
 
 			if (curproxy->uri_auth->auth_realm) {
-				free(curproxy->uri_auth->auth_realm);
-				curproxy->uri_auth->auth_realm = NULL;
+				ha_free(&curproxy->uri_auth->auth_realm);
 			}
 			curproxy->uri_auth->flags |= STAT_CONVDONE;
 		}
@@ -2631,15 +2622,13 @@
 			    curproxy->conf.logformat_string != clf_http_log_format)
 				free(curproxy->conf.logformat_string);
 			curproxy->conf.logformat_string = NULL;
-			free(curproxy->conf.lfs_file);
-			curproxy->conf.lfs_file = NULL;
+			ha_free(&curproxy->conf.lfs_file);
 			curproxy->conf.lfs_line = 0;
 
 			if (curproxy->conf.logformat_sd_string != default_rfc5424_sd_log_format)
 				free(curproxy->conf.logformat_sd_string);
 			curproxy->conf.logformat_sd_string = NULL;
-			free(curproxy->conf.lfsd_file);
-			curproxy->conf.lfsd_file = NULL;
+			ha_free(&curproxy->conf.lfsd_file);
 			curproxy->conf.lfsd_line = 0;
 		}
 
@@ -2937,8 +2926,7 @@
 				newsrv->tracknext = srv->trackers;
 				srv->trackers = newsrv;
 
-				free(newsrv->trackit);
-				newsrv->trackit = NULL;
+				ha_free(&newsrv->trackit);
 			}
 
 		next_srv:
diff --git a/src/check.c b/src/check.c
index 5b65354..0fab0d4 100644
--- a/src/check.c
+++ b/src/check.c
@@ -1062,8 +1062,7 @@
 	check_release_buf(check, &check->bi);
 	check_release_buf(check, &check->bo);
 	if (check->cs) {
-		free(check->cs->conn);
-		check->cs->conn = NULL;
+		ha_free(&check->cs->conn);
 		cs_free(check->cs);
 		check->cs = NULL;
 	}
@@ -1478,8 +1477,7 @@
 {
 	if (srv->agent.tcpcheck_rules) {
 		free_tcpcheck_vars(&srv->agent.tcpcheck_rules->preset_vars);
-		free(srv->agent.tcpcheck_rules);
-		srv->agent.tcpcheck_rules = NULL;
+		ha_free(&srv->agent.tcpcheck_rules);
 	}
 
 	if (srv->agent.state & CHK_ST_CONFIGURED)
diff --git a/src/cli.c b/src/cli.c
index 8b32e76..f48795a 100644
--- a/src/cli.c
+++ b/src/cli.c
@@ -98,8 +98,7 @@
 	struct buffer *tmp = get_trash_chunk();
 	struct buffer out;
 
-	free(dynamic_usage_msg);
-	dynamic_usage_msg = NULL;
+	ha_free(&dynamic_usage_msg);
 
 	if (LIST_ISEMPTY(&cli_keywords.list))
 		goto end;
@@ -851,8 +850,7 @@
 				if (cli_output_msg(res, msg, sev, cli_get_severity_output(appctx)) != -1) {
 					if (appctx->st0 == CLI_ST_PRINT_FREE ||
 					    appctx->st0 == CLI_ST_PRINT_DYN) {
-						free(appctx->ctx.cli.err);
-						appctx->ctx.cli.err = NULL;
+						ha_free(&appctx->ctx.cli.err);
 					}
 					appctx->st0 = CLI_ST_PROMPT;
 				}
@@ -961,8 +959,7 @@
 		appctx->io_release = NULL;
 	}
 	else if (appctx->st0 == CLI_ST_PRINT_FREE || appctx->st0 == CLI_ST_PRINT_DYN) {
-		free(appctx->ctx.cli.err);
-		appctx->ctx.cli.err = NULL;
+		ha_free(&appctx->ctx.cli.err);
 	}
 }
 
@@ -2580,8 +2577,7 @@
 		                       &errmsg, NULL, NULL, PA_O_STREAM)) == 0) {
 			goto error;
 		}
-		free(msg);
-		msg = NULL;
+		ha_free(&msg);
 
 		if (!proto->connect) {
 			goto error;
@@ -2605,13 +2601,11 @@
 	list_for_each_entry(child, &proc_list, list) {
 		free((char *)child->srv->conf.file); /* cast because of const char *  */
 		free(child->srv->id);
-		free(child->srv);
-		child->srv = NULL;
+		ha_free(&child->srv);
 	}
 	free(mworker_proxy->id);
 	free(mworker_proxy->conf.file);
-	free(mworker_proxy);
-	mworker_proxy = NULL;
+	ha_free(&mworker_proxy);
 	free(errmsg);
 	free(msg);
 
@@ -2765,8 +2759,7 @@
 		ha_alert("Cannot create a CLI sockpair listener for process #%d\n", proc);
 		goto error;
 	}
-	free(path);
-	path = NULL;
+	ha_free(&path);
 
 	list_for_each_entry(l, &bind_conf->listeners, by_bind) {
 		l->accept = session_accept_fd;
diff --git a/src/dict.c b/src/dict.c
index 9b3536d..f3c2a73 100644
--- a/src/dict.c
+++ b/src/dict.c
@@ -42,8 +42,7 @@
 	return de;
 
  err:
-	free(de->value.key);
-	de->value.key = NULL;
+	ha_free(&de->value.key);
 	de->len = 0;
 	free(de);
 	return NULL;
@@ -55,8 +54,7 @@
 static void free_dict_entry(struct dict_entry *de)
 {
 	de->refcount = 0;
-	free(de->value.key);
-	de->value.key = NULL;
+	ha_free(&de->value.key);
 	free(de);
 }
 
diff --git a/src/dns.c b/src/dns.c
index 69364eb..dfdf546 100644
--- a/src/dns.c
+++ b/src/dns.c
@@ -1304,8 +1304,7 @@
 
 void deinit_dns_buffers()
 {
-	free(dns_msg_trash);
-	dns_msg_trash = NULL;
+	ha_free(&dns_msg_trash);
 }
 
 REGISTER_PER_THREAD_ALLOC(init_dns_buffers);
diff --git a/src/ev_epoll.c b/src/ev_epoll.c
index ba7f2e0..f43875c 100644
--- a/src/ev_epoll.c
+++ b/src/ev_epoll.c
@@ -287,8 +287,7 @@
 	if (MAX_THREADS > 1 && tid)
 		close(epoll_fd[tid]);
 
-	free(epoll_events);
-	epoll_events = NULL;
+	ha_free(&epoll_events);
 }
 
 /*
diff --git a/src/ev_evports.c b/src/ev_evports.c
index 2ad546f..a197730 100644
--- a/src/ev_evports.c
+++ b/src/ev_evports.c
@@ -309,8 +309,7 @@
 	return 1;
 
  fail_fd:
-	free(evports_evlist);
-	evports_evlist = NULL;
+	ha_free(&evports_evlist);
 	evports_evlist_max = 0;
  fail_alloc:
 	return 0;
@@ -321,8 +320,7 @@
 	if (MAX_THREADS > 1 && tid)
 		close(evports_fd[tid]);
 
-	free(evports_evlist);
-	evports_evlist = NULL;
+	ha_free(&evports_evlist);
 	evports_evlist_max = 0;
 }
 
@@ -362,8 +360,7 @@
 	p->private = NULL;
 	p->pref = 0;
 
-	free(evports_evlist);
-	evports_evlist = NULL;
+	ha_free(&evports_evlist);
 	evports_evlist_max = 0;
 }
 
diff --git a/src/ev_kqueue.c b/src/ev_kqueue.c
index a67d05b..bc17480 100644
--- a/src/ev_kqueue.c
+++ b/src/ev_kqueue.c
@@ -252,8 +252,7 @@
 	if (MAX_THREADS > 1 && tid)
 		close(kqueue_fd[tid]);
 
-	free(kev);
-	kev = NULL;
+	ha_free(&kev);
 }
 
 /*
@@ -283,8 +282,7 @@
 	return 1;
 
  fail_fd:
-	free(kev_out);
-	kev_out = NULL;
+	ha_free(&kev_out);
 fail_alloc:
 	p->pref = 0;
 	return 0;
@@ -304,8 +302,7 @@
 	p->private = NULL;
 	p->pref = 0;
 	if (kev_out) {
-		free(kev_out);
-		kev_out = NULL;
+		ha_free(&kev_out);
 	}
 }
 
diff --git a/src/ev_poll.c b/src/ev_poll.c
index 17f7338..7ef9df0 100644
--- a/src/ev_poll.c
+++ b/src/ev_poll.c
@@ -258,8 +258,7 @@
 
 static void deinit_poll_per_thread()
 {
-	free(poll_events);
-	poll_events = NULL;
+	ha_free(&poll_events);
 }
 
 /*
diff --git a/src/ev_select.c b/src/ev_select.c
index 3e42f72..2e24d92 100644
--- a/src/ev_select.c
+++ b/src/ev_select.c
@@ -241,10 +241,8 @@
 
 static void deinit_select_per_thread()
 {
-	free(tmp_evts[DIR_WR]);
-	tmp_evts[DIR_WR] = NULL;
-	free(tmp_evts[DIR_RD]);
-	tmp_evts[DIR_RD] = NULL;
+	ha_free(&tmp_evts[DIR_WR]);
+	ha_free(&tmp_evts[DIR_RD]);
 }
 
 /*
diff --git a/src/extcheck.c b/src/extcheck.c
index 9ef87c5..4634731 100644
--- a/src/extcheck.c
+++ b/src/extcheck.c
@@ -358,15 +358,13 @@
 	if (check->envp) {
 		for (i = 0; i < EXTCHK_SIZE; i++)
 			free(check->envp[i]);
-		free(check->envp);
-		check->envp = NULL;
+		ha_free(&check->envp);
 	}
 
 	if (check->argv) {
 		for (i = 1; i < 5; i++)
 			free(check->argv[i]);
-		free(check->argv);
-		check->argv = NULL;
+		ha_free(&check->argv);
 	}
 	return 0;
 }
diff --git a/src/fcgi-app.c b/src/fcgi-app.c
index e3acd16..f4ce40c 100644
--- a/src/fcgi-app.c
+++ b/src/fcgi-app.c
@@ -552,8 +552,7 @@
 		/* Place the filter at its right position */
 		LIST_DEL(&f->list);
 		free(f);
-		free(name);
-		name = NULL;
+		ha_free(&name);
 		break;
 	}
 
diff --git a/src/fd.c b/src/fd.c
index 6d850e7..5102c94 100644
--- a/src/fd.c
+++ b/src/fd.c
@@ -649,8 +649,7 @@
 /* Release the pollers per thread, to be called late */
 static void free_pollers_per_thread()
 {
-	free(fd_updt);
-	fd_updt = NULL;
+	ha_free(&fd_updt);
 }
 
 /*
@@ -723,9 +722,9 @@
 			bp->term(bp);
 	}
 
-	free(fdinfo);   fdinfo   = NULL;
-	free(fdtab);    fdtab    = NULL;
-	free(polled_mask); polled_mask = NULL;
+	ha_free(&fdinfo);
+	ha_free(&fdtab);
+	ha_free(&polled_mask);
 }
 
 /*
diff --git a/src/flt_spoe.c b/src/flt_spoe.c
index 92a5af4..1b6ac2f 100644
--- a/src/flt_spoe.c
+++ b/src/flt_spoe.c
@@ -3099,8 +3099,7 @@
 		}
 	}
 
-	free(conf->agent->b.name);
-	conf->agent->b.name = NULL;
+	ha_free(&conf->agent->b.name);
 	conf->agent->b.be = target;
 	return 0;
 }
diff --git a/src/haproxy.c b/src/haproxy.c
index 2dce675..7e02e5b 100644
--- a/src/haproxy.c
+++ b/src/haproxy.c
@@ -841,13 +841,11 @@
 	execvp(next_argv[0], next_argv);
 
 	ha_warning("Failed to reexecute the master process [%d]: %s\n", pid, strerror(errno));
-	free(next_argv);
-	next_argv = NULL;
+	ha_free(&next_argv);
 	return;
 
 alloc_error:
-	free(next_argv);
-	next_argv = NULL;
+	ha_free(&next_argv);
 	ha_warning("Failed to reexecute the master process [%d]: Cannot allocate memory\n", pid);
 	return;
 }
@@ -2758,17 +2756,17 @@
 	list_for_each_entry(pdf, &post_deinit_list, list)
 		pdf->fct();
 
-	free(global.log_send_hostname); global.log_send_hostname = NULL;
+	ha_free(&global.log_send_hostname);
 	chunk_destroy(&global.log_tag);
-	free(global.chroot);  global.chroot = NULL;
-	free(global.pidfile); global.pidfile = NULL;
-	free(global.node);    global.node = NULL;
-	free(global.desc);    global.desc = NULL;
-	free(oldpids);        oldpids = NULL;
-	free(old_argv);       old_argv = NULL;
-	free(localpeer);      localpeer = NULL;
-	free(global.server_state_base); global.server_state_base = NULL;
-	free(global.server_state_file); global.server_state_file = NULL;
+	ha_free(&global.chroot);
+	ha_free(&global.pidfile);
+	ha_free(&global.node);
+	ha_free(&global.desc);
+	ha_free(&oldpids);
+	ha_free(&old_argv);
+	ha_free(&localpeer);
+	ha_free(&global.server_state_base);
+	ha_free(&global.server_state_file);
 	task_destroy(idle_conn_task);
 	idle_conn_task = NULL;
 
@@ -3314,8 +3312,7 @@
 
 	if ((getenv("HAPROXY_MWORKER_REEXEC") == NULL)) {
 		nb_oldpids = 0;
-		free(oldpids);
-		oldpids = NULL;
+		ha_free(&oldpids);
 	}
 
 
@@ -3452,7 +3449,7 @@
 		}
 
 		/* We won't ever use this anymore */
-		free(global.pidfile); global.pidfile = NULL;
+		ha_free(&global.pidfile);
 
 		if (proc == global.nbproc) {
 			if (global.mode & (MODE_MWORKER|MODE_MWORKER_WAIT)) {
@@ -3527,8 +3524,7 @@
 			}
 		}
 
-		free(global.chroot);
-		global.chroot = NULL;
+		ha_free(&global.chroot);
 		set_identity(argv[0]);
 
 		/* pass through every cli socket, and check if it's bound to
diff --git a/src/http_fetch.c b/src/http_fetch.c
index 8e74765..6ccd9dd 100644
--- a/src/http_fetch.c
+++ b/src/http_fetch.c
@@ -68,8 +68,7 @@
 
 static void free_raw_htx_chunk_per_thread()
 {
-	free(static_raw_htx_buf);
-	static_raw_htx_buf = NULL;
+	ha_free(&static_raw_htx_buf);
 }
 
 REGISTER_PER_THREAD_ALLOC(alloc_raw_htx_chunk_per_thread);
diff --git a/src/http_htx.c b/src/http_htx.c
index e2e6ce1..cf536a3 100644
--- a/src/http_htx.c
+++ b/src/http_htx.c
@@ -1009,8 +1009,7 @@
 	if (!http_reply)
 		return;
 
-	free(http_reply->ctype);
-	http_reply->ctype = NULL;
+	ha_free(&http_reply->ctype);
 	list_for_each_entry_safe(hdr, hdrb, &http_reply->hdrs, list) {
 		LIST_DEL(&hdr->list);
 		list_for_each_entry_safe(lf, lfb, &hdr->value, list) {
@@ -1024,8 +1023,7 @@
 	}
 
 	if (http_reply->type == HTTP_REPLY_ERRFILES) {
-		free(http_reply->body.http_errors);
-		http_reply->body.http_errors = NULL;
+		ha_free(&http_reply->body.http_errors);
 	}
 	else if (http_reply->type == HTTP_REPLY_RAW)
 		chunk_destroy(&http_reply->body.obj);
@@ -1067,8 +1065,7 @@
 		}
 
 		/* Reset errmsg */
-		free(errmsg);
-		errmsg = NULL;
+		ha_free(&errmsg);
 
 		http_err_chunks[rc] = chk;
 		http_err_replies[rc].type = HTTP_REPLY_ERRMSG;
@@ -1627,8 +1624,7 @@
 			ha_warning("parsing [%s:%d] : content-type '%s' ignored by the http reply because"
 				   " neither errorfile nor payload defined.\n",
 				   px->conf.args.file, px->conf.args.line, reply->ctype);
-			free(reply->ctype);
-			reply->ctype = NULL;
+			ha_free(&reply->ctype);
 		}
 	}
 	else if (reply->type == HTTP_REPLY_ERRFILES || reply->type == HTTP_REPLY_ERRMSG) { /* errorfiles or errorfile */
@@ -1653,8 +1649,7 @@
 			ha_warning("parsing [%s:%d] : content-type '%s' ignored by the http reply when used "
 				   "with an erorrfile.\n",
 				   px->conf.args.file, px->conf.args.line, reply->ctype);
-			free(reply->ctype);
-			reply->ctype = NULL;
+			ha_free(&reply->ctype);
 		}
 		if (!LIST_ISEMPTY(&reply->hdrs)) {
 			ha_warning("parsing [%s:%d] : hdr parameters ignored by the http reply when used "
@@ -1686,8 +1681,7 @@
 			ha_warning("parsing [%s:%d] : content-type '%s' ignored by the http reply when used "
 				   "with an empty payload.\n",
 				   px->conf.args.file, px->conf.args.line, reply->ctype);
-			free(reply->ctype);
-			reply->ctype = NULL;
+			ha_free(&reply->ctype);
 		}
 		if (b_room(&reply->body.obj) < global.tune.maxrewrite) {
 			ha_warning("parsing [%s:%d] : http reply payload runs over the buffer space reserved to headers rewriting."
diff --git a/src/mailers.c b/src/mailers.c
index 76d6a69..291064d 100644
--- a/src/mailers.c
+++ b/src/mailers.c
@@ -50,8 +50,7 @@
 			free_tcpcheck(rule, 1);
 		}
 		free_tcpcheck_vars(&alert->rules.preset_vars);
-		free(alert->rules.list);
-		alert->rules.list = NULL;
+		ha_free(&alert->rules.list);
 	}
 	pool_free(pool_head_email_alert, alert);
 }
diff --git a/src/map.c b/src/map.c
index cd356b9..6b5502e 100644
--- a/src/map.c
+++ b/src/map.c
@@ -585,8 +585,7 @@
 
 static void cli_release_mlook(struct appctx *appctx)
 {
-	free(appctx->ctx.map.chunk.area);
-	appctx->ctx.map.chunk.area = NULL;
+	ha_free(&appctx->ctx.map.chunk.area);
 }
 
 
diff --git a/src/mworker-prog.c b/src/mworker-prog.c
index acf84b0..4113b7c 100644
--- a/src/mworker-prog.c
+++ b/src/mworker-prog.c
@@ -307,18 +307,14 @@
 			int i;
 
 			for (i = 0; ext_child->command[i]; i++) {
-				free(ext_child->command[i]);
-				ext_child->command[i] = NULL;
+				ha_free(&ext_child->command[i]);
 			}
-			free(ext_child->command);
-			ext_child->command = NULL;
+			ha_free(&ext_child->command);
 		}
-		free(ext_child->id);
-		ext_child->id = NULL;
+		ha_free(&ext_child->id);
 	}
 
-	free(ext_child);
-	ext_child = NULL;
+	ha_free(&ext_child);
 
 out:
 	return err_code;
diff --git a/src/mworker.c b/src/mworker.c
index abdc1d3..27a1b9f 100644
--- a/src/mworker.c
+++ b/src/mworker.c
@@ -458,8 +458,7 @@
 	chunk_printf(&trash, "#%-14s %-15s %-15s %-15s %-15s %-15s\n", "<PID>", "<type>", "<relative PID>", "<reloads>", "<uptime>", "<version>");
 	memprintf(&uptime, "%dd%02dh%02dm%02ds", up / 86400, (up % 86400) / 3600, (up % 3600) / 60, (up % 60));
 	chunk_appendf(&trash, "%-15u %-15s %-15u %-15d %-15s %-15s\n", (unsigned int)getpid(), "master", 0, proc_self->reloads, uptime, haproxy_version);
-	free(uptime);
-	uptime = NULL;
+	ha_free(&uptime);
 
 	/* displays current processes */
 
@@ -476,8 +475,7 @@
 		}
 		memprintf(&uptime, "%dd%02dh%02dm%02ds", up / 86400, (up % 86400) / 3600, (up % 3600) / 60, (up % 60));
 		chunk_appendf(&trash, "%-15u %-15s %-15u %-15d %-15s %-15s\n", child->pid, "worker", child->relative_pid, child->reloads, uptime, child->version);
-		free(uptime);
-		uptime = NULL;
+		ha_free(&uptime);
 	}
 
 	/* displays old processes */
@@ -496,8 +494,7 @@
 				memprintf(&msg, "[was: %u]", child->relative_pid);
 				memprintf(&uptime, "%dd%02dh%02dm%02ds", up / 86400, (up % 86400) / 3600, (up % 3600) / 60, (up % 60));
 				chunk_appendf(&trash, "%-15u %-15s %-15s %-15d %-15s %-15s\n", child->pid, "worker", msg, child->reloads, uptime, child->version);
-				free(uptime);
-				uptime = NULL;
+				ha_free(&uptime);
 			}
 		}
 		free(msg);
@@ -518,8 +515,7 @@
 		}
 		memprintf(&uptime, "%dd%02dh%02dm%02ds", up / 86400, (up % 86400) / 3600, (up % 3600) / 60, (up % 60));
 		chunk_appendf(&trash, "%-15u %-15s %-15s %-15d %-15s %-15s\n", child->pid, child->id, "-", child->reloads, uptime, "-");
-		free(uptime);
-		uptime = NULL;
+		ha_free(&uptime);
 	}
 
 	if (old) {
@@ -533,8 +529,7 @@
 			if (child->options & PROC_O_LEAVING) {
 				memprintf(&uptime, "%dd%02dh%02dm%02ds", up / 86400, (up % 86400) / 3600, (up % 3600) / 60, (up % 60));
 				chunk_appendf(&trash, "%-15u %-15s %-15s %-15d %-15s %-15s\n", child->pid, child->id, "-", child->reloads, uptime, "-");
-				free(uptime);
-				uptime = NULL;
+				ha_free(&uptime);
 			}
 		}
 	}
@@ -598,21 +593,17 @@
 
 		for (i = 0; child->command[i]; i++) {
 			if (child->command[i]) {
-				free(child->command[i]);
-				child->command[i] = NULL;
+				ha_free(&child->command[i]);
 			}
 
 		}
-		free(child->command);
-		child->command = NULL;
+		ha_free(&child->command);
 	}
 	if (child->id) {
-		free(child->id);
-		child->id = NULL;
+		ha_free(&child->id);
 	}
 	if (child->version) {
-		free(child->version);
-		child->version = NULL;
+		ha_free(&child->version);
 	}
 	free(child);
 }
diff --git a/src/pattern.c b/src/pattern.c
index 8729769..6394470 100644
--- a/src/pattern.c
+++ b/src/pattern.c
@@ -1772,8 +1772,7 @@
 						*err = *merr;
 					} else {
 						memprintf(err, "%s, %s", *err, *merr);
-						free(*merr);
-						*merr = NULL;
+						ha_free(merr);
 					}
 				}
 			}
diff --git a/src/protocol.c b/src/protocol.c
index cb9f6e7..77396d0 100644
--- a/src/protocol.c
+++ b/src/protocol.c
@@ -86,7 +86,7 @@
 				else if (lerr & ERR_WARN)
 					ha_warning("Starting %s %s: %s\n",
 						   proxy_type_str(px), px->id, errmsg);
-				free(errmsg); errmsg = NULL;
+				ha_free(&errmsg);
 			}
 			if (lerr & ERR_ABORT)
 				break;
diff --git a/src/proxy.c b/src/proxy.c
index abca609..de66140 100644
--- a/src/proxy.c
+++ b/src/proxy.c
@@ -1119,40 +1119,37 @@
  */
 void proxy_free_defaults(struct proxy *defproxy)
 {
-	free(defproxy->id); defproxy->id = NULL;
-	free(defproxy->conf.file); defproxy->conf.file = NULL;
-	free(defproxy->check_command); defproxy->check_command = NULL;
-	free(defproxy->check_path); defproxy->check_path = NULL;
-	free(defproxy->cookie_name); defproxy->cookie_name = NULL;
-	free(defproxy->rdp_cookie_name); defproxy->rdp_cookie_name = NULL;
-	free(defproxy->dyncookie_key); defproxy->dyncookie_key = NULL;
-	free(defproxy->cookie_domain); defproxy->cookie_domain = NULL;
-	free(defproxy->cookie_attrs);  defproxy->cookie_attrs = NULL;
-	free(defproxy->lbprm.arg_str); defproxy->lbprm.arg_str = NULL;
-	free(defproxy->capture_name); defproxy->capture_name = NULL;
-	free(defproxy->monitor_uri); defproxy->monitor_uri = NULL;
-	free(defproxy->defbe.name); defproxy->defbe.name = NULL;
-	free(defproxy->conn_src.iface_name); defproxy->conn_src.iface_name = NULL;
-	free(defproxy->fwdfor_hdr_name); defproxy->fwdfor_hdr_name = NULL; defproxy->fwdfor_hdr_len = 0;
-	free(defproxy->orgto_hdr_name); defproxy->orgto_hdr_name = NULL; defproxy->orgto_hdr_len = 0;
-	free(defproxy->server_id_hdr_name); defproxy->server_id_hdr_name = NULL; defproxy->server_id_hdr_len = 0;
+	ha_free(&defproxy->id);
+	ha_free(&defproxy->conf.file);
+	ha_free(&defproxy->check_command);
+	ha_free(&defproxy->check_path);
+	ha_free(&defproxy->cookie_name);
+	ha_free(&defproxy->rdp_cookie_name);
+	ha_free(&defproxy->dyncookie_key);
+	ha_free(&defproxy->cookie_domain);
+	ha_free(&defproxy->cookie_attrs);
+	ha_free(&defproxy->lbprm.arg_str);
+	ha_free(&defproxy->capture_name);
+	ha_free(&defproxy->monitor_uri);
+	ha_free(&defproxy->defbe.name);
+	ha_free(&defproxy->conn_src.iface_name);
+	ha_free(&defproxy->fwdfor_hdr_name); defproxy->fwdfor_hdr_len = 0;
+	ha_free(&defproxy->orgto_hdr_name); defproxy->orgto_hdr_len = 0;
+	ha_free(&defproxy->server_id_hdr_name); defproxy->server_id_hdr_len = 0;
 
 	if (defproxy->conf.logformat_string != default_http_log_format &&
 	    defproxy->conf.logformat_string != default_tcp_log_format &&
 	    defproxy->conf.logformat_string != clf_http_log_format) {
-		free(defproxy->conf.logformat_string);
-		defproxy->conf.logformat_string = NULL;
+		ha_free(&defproxy->conf.logformat_string);
 	}
 
-	if (defproxy->conf.logformat_sd_string != default_rfc5424_sd_log_format) {
-		free(defproxy->conf.logformat_sd_string);
-		defproxy->conf.logformat_sd_string = NULL;
-	}
+	if (defproxy->conf.logformat_sd_string != default_rfc5424_sd_log_format)
+		ha_free(&defproxy->conf.logformat_sd_string);
 
-	free(defproxy->conf.uniqueid_format_string); defproxy->conf.uniqueid_format_string = NULL;
-	free(defproxy->conf.lfs_file); defproxy->conf.lfs_file = NULL;
-	free(defproxy->conf.lfsd_file); defproxy->conf.lfsd_file = NULL;
-	free(defproxy->conf.uif_file); defproxy->conf.uif_file = NULL;
+	ha_free(&defproxy->conf.uniqueid_format_string);
+	ha_free(&defproxy->conf.lfs_file);
+	ha_free(&defproxy->conf.lfsd_file);
+	ha_free(&defproxy->conf.uif_file);
 	chunk_destroy(&defproxy->log_tag);
 
 	free_email_alert(defproxy);
@@ -2415,10 +2412,8 @@
 
 	for (s = px->srv; s != NULL; s = s->next) {
 		HA_SPIN_LOCK(SERVER_LOCK, &s->lock);
-		if (!(s->flags & SRV_F_COOKIESET)) {
-			free(s->cookie);
-			s->cookie = NULL;
-		}
+		if (!(s->flags & SRV_F_COOKIESET))
+			ha_free(&s->cookie);
 		HA_SPIN_UNLOCK(SERVER_LOCK, &s->lock);
 	}
 
diff --git a/src/resolvers.c b/src/resolvers.c
index ab7159f..55acd9c 100644
--- a/src/resolvers.c
+++ b/src/resolvers.c
@@ -572,10 +572,8 @@
 					    item->data_len == srv->hostname_dn_len &&
 					    !resolv_hostname_cmp(srv->hostname_dn, item->target, item->data_len)) {
 						snr_update_srv_status(srv, 1);
-						free(srv->hostname);
-						free(srv->hostname_dn);
-						srv->hostname        = NULL;
-						srv->hostname_dn     = NULL;
+						ha_free(&srv->hostname);
+						ha_free(&srv->hostname_dn);
 						srv->hostname_dn_len = 0;
 						memset(&srv->addr, 0, sizeof(srv->addr));
 						srv->svc_port = 0;
@@ -2509,7 +2507,7 @@
 	return 0;
 
  err:
-	free(stream->resolv_ctx.hostname_dn); stream->resolv_ctx.hostname_dn = NULL;
+	ha_free(&stream->resolv_ctx.hostname_dn);
 	resolv_failed_resolutions += 1;
 	return -1;
 }
@@ -2620,8 +2618,7 @@
 	return ret;
 
   release_requester:
-	free(s->resolv_ctx.hostname_dn);
-	s->resolv_ctx.hostname_dn = NULL;
+	ha_free(&s->resolv_ctx.hostname_dn);
 	s->resolv_ctx.hostname_dn_len = 0;
 	if (s->resolv_ctx.requester) {
 		resolv_unlink_resolution(s->resolv_ctx.requester);
@@ -2750,8 +2747,8 @@
 	return ACT_RET_PRS_OK;
 
  do_resolve_parse_error:
-	free(rule->arg.resolv.varname); rule->arg.resolv.varname = NULL;
-	free(rule->arg.resolv.resolvers_id); rule->arg.resolv.resolvers_id = NULL;
+	ha_free(&rule->arg.resolv.varname);
+	ha_free(&rule->arg.resolv.resolvers_id);
 	memprintf(err, "Can't parse '%s'. Expects 'do-resolve(<varname>,<resolvers>[,<options>]) <expr>'. Available options are 'ipv4' and 'ipv6'",
 			args[cur_arg]);
 	return ACT_RET_PRS_ERR;
diff --git a/src/server.c b/src/server.c
index 5bbad82..b6a1bc2 100644
--- a/src/server.c
+++ b/src/server.c
@@ -1606,8 +1606,8 @@
 	return 0;
 
  err:
-	free(srv->hostname);    srv->hostname    = NULL;
-	free(srv->hostname_dn); srv->hostname_dn = NULL;
+	ha_free(&srv->hostname);
+	ha_free(&srv->hostname_dn);
 	return -1;
 }
 
diff --git a/src/sink.c b/src/sink.c
index 15fc475..0bd259c 100644
--- a/src/sink.c
+++ b/src/sink.c
@@ -82,9 +82,9 @@
 	return sink;
 
  err:
-	free(sink->name); sink->name = NULL;
-	free(sink->desc); sink->desc = NULL;
-	free(sink); sink = NULL;
+	ha_free(&sink->name);
+	ha_free(&sink->desc);
+	ha_free(&sink);
 
 	return NULL;
 }
diff --git a/src/sock.c b/src/sock.c
index 596be43..9ad5b67 100644
--- a/src/sock.c
+++ b/src/sock.c
@@ -410,8 +410,7 @@
 		socklen = sizeof(xfer_sock->addr);
 		if (getsockname(fd, (struct sockaddr *)&xfer_sock->addr, &socklen) != 0) {
 			ha_warning("Failed to get socket address\n");
-			free(xfer_sock);
-			xfer_sock = NULL;
+			ha_free(&xfer_sock);
 			continue;
 		}
 
diff --git a/src/ssl_ckch.c b/src/ssl_ckch.c
index c206a09..7c3da05 100644
--- a/src/ssl_ckch.c
+++ b/src/ssl_ckch.c
@@ -130,14 +130,12 @@
 
 	sctl = calloc(1, sizeof(*sctl));
 	if (!chunk_dup(sctl, src)) {
-		free(sctl);
-		sctl = NULL;
+		ha_free(&sctl);
 		goto end;
 	}
 	/* no error, fill ckch with new context, old context must be free */
 	if (ckch->sctl) {
-		free(ckch->sctl->area);
-		ckch->sctl->area = NULL;
+		ha_free(&ckch->sctl->area);
 		free(ckch->sctl);
 	}
 	ckch->sctl = sctl;
@@ -212,14 +210,12 @@
 
 	ocsp_response = calloc(1, sizeof(*ocsp_response));
 	if (!chunk_dup(ocsp_response, src)) {
-		free(ocsp_response);
-		ocsp_response = NULL;
+		ha_free(&ocsp_response);
 		goto end;
 	}
 	/* no error, fill ckch with new context, old context must be free */
 	if (ckch->ocsp_response) {
-		free(ckch->ocsp_response->area);
-		ckch->ocsp_response->area = NULL;
+		ha_free(&ckch->ocsp_response->area);
 		free(ckch->ocsp_response);
 	}
 	ckch->ocsp_response = ocsp_response;
@@ -562,17 +558,13 @@
 
 	/* once it loaded the PEM, it should remove everything else in the ckch */
 	if (ckch->ocsp_response) {
-		free(ckch->ocsp_response->area);
-		ckch->ocsp_response->area = NULL;
-		free(ckch->ocsp_response);
-		ckch->ocsp_response = NULL;
+		ha_free(&ckch->ocsp_response->area);
+		ha_free(&ckch->ocsp_response);
 	}
 
 	if (ckch->sctl) {
-		free(ckch->sctl->area);
-		ckch->sctl->area = NULL;
-		free(ckch->sctl);
-		ckch->sctl = NULL;
+		ha_free(&ckch->sctl->area);
+		ha_free(&ckch->sctl);
 	}
 
 	if (ckch->ocsp_issuer) {
@@ -632,17 +624,13 @@
 	ckch->dh = NULL;
 
 	if (ckch->sctl) {
-		free(ckch->sctl->area);
-		ckch->sctl->area = NULL;
-		free(ckch->sctl);
-		ckch->sctl = NULL;
+		ha_free(&ckch->sctl->area);
+		ha_free(&ckch->sctl);
 	}
 
 	if (ckch->ocsp_response) {
-		free(ckch->ocsp_response->area);
-		ckch->ocsp_response->area = NULL;
-		free(ckch->ocsp_response);
-		ckch->ocsp_response = NULL;
+		ha_free(&ckch->ocsp_response->area);
+		ha_free(&ckch->ocsp_response);
 	}
 
 	if (ckch->ocsp_issuer)
@@ -689,8 +677,7 @@
 
 		sctl = calloc(1, sizeof(*sctl));
 		if (!chunk_dup(sctl, src->sctl)) {
-			free(sctl);
-			sctl = NULL;
+			ha_free(&sctl);
 			goto error;
 		}
 		dst->sctl = sctl;
@@ -701,8 +688,7 @@
 
 		ocsp_response = calloc(1, sizeof(*ocsp_response));
 		if (!chunk_dup(ocsp_response, src->ocsp_response)) {
-			free(ocsp_response);
-			ocsp_response = NULL;
+			ha_free(&ocsp_response);
 			goto error;
 		}
 		dst->ocsp_response = ocsp_response;
@@ -788,8 +774,7 @@
 
 	ssl_sock_free_cert_key_and_chain_contents(store->ckch);
 
-	free(store->ckch);
-	store->ckch = NULL;
+	ha_free(&store->ckch);
 
 	list_for_each_entry_safe(inst, inst_s, &store->ckch_inst, by_ckchs) {
 		ckch_inst_free(inst);
@@ -1418,10 +1403,9 @@
 						ckchi->server->ssl_ctx.inst = ckchi;
 
 						/* flush the session cache of the server */
-						for (i = 0; i < global.nbthread; i++) {
-							free(ckchi->server->ssl_ctx.reused_sess[i].ptr);
-							ckchi->server->ssl_ctx.reused_sess[i].ptr = NULL;
-						}
+						for (i = 0; i < global.nbthread; i++)
+							ha_free(&ckchi->server->ssl_ctx.reused_sess[i].ptr);
+
 						HA_RWLOCK_WRUNLOCK(SSL_SERVER_LOCK, &ckchi->server->ssl_ctx.lock);
 
 					} else {
@@ -1453,8 +1437,7 @@
 				/* fallthrough */
 			case SETCERT_ST_FIN:
 				/* we achieved the transaction, we can set everything to NULL */
-				free(ckchs_transaction.path);
-				ckchs_transaction.path = NULL;
+				ha_free(&ckchs_transaction.path);
 				ckchs_transaction.new_ckchs = NULL;
 				ckchs_transaction.old_ckchs = NULL;
 				goto end;
@@ -1714,8 +1697,7 @@
 
 		appctx->ctx.ssl.old_ckchs = NULL;
 
-		free(appctx->ctx.ssl.path);
-		appctx->ctx.ssl.path = NULL;
+		ha_free(&appctx->ctx.ssl.path);
 
 		HA_SPIN_UNLOCK(CKCH_LOCK, &ckch_lock);
 		return cli_dynerr(appctx, memprintf(&err, "%sCan't update %s!\n", err ? err : "", args[3]));
@@ -1757,8 +1739,7 @@
 	ckch_store_free(ckchs_transaction.new_ckchs);
 	ckchs_transaction.new_ckchs = NULL;
 	ckchs_transaction.old_ckchs = NULL;
-	free(ckchs_transaction.path);
-	ckchs_transaction.path = NULL;
+	ha_free(&ckchs_transaction.path);
 
 	HA_SPIN_UNLOCK(CKCH_LOCK, &ckch_lock);
 
diff --git a/src/ssl_crtlist.c b/src/ssl_crtlist.c
index c51fa11..9ce7115 100644
--- a/src/ssl_crtlist.c
+++ b/src/ssl_crtlist.c
@@ -35,29 +35,20 @@
 {
 	if (conf) {
 #if defined(OPENSSL_NPN_NEGOTIATED) && !defined(OPENSSL_NO_NEXTPROTONEG)
-		free(conf->npn_str);
-		conf->npn_str = NULL;
+		ha_free(&conf->npn_str);
 #endif
 #ifdef TLSEXT_TYPE_application_layer_protocol_negotiation
-		free(conf->alpn_str);
-		conf->alpn_str = NULL;
+		ha_free(&conf->alpn_str);
 #endif
-		free(conf->ca_file);
-		conf->ca_file = NULL;
-		free(conf->ca_verify_file);
-		conf->ca_verify_file = NULL;
-		free(conf->crl_file);
-		conf->crl_file = NULL;
-		free(conf->ciphers);
-		conf->ciphers = NULL;
+		ha_free(&conf->ca_file);
+		ha_free(&conf->ca_verify_file);
+		ha_free(&conf->crl_file);
+		ha_free(&conf->ciphers);
 #ifdef HAVE_SSL_CTX_SET_CIPHERSUITES
-		free(conf->ciphersuites);
-		conf->ciphersuites = NULL;
+		ha_free(&conf->ciphersuites);
 #endif
-		free(conf->curves);
-		conf->curves = NULL;
-		free(conf->ecdhe);
-		conf->ecdhe = NULL;
+		ha_free(&conf->curves);
+		ha_free(&conf->ecdhe);
 	}
 }
 
@@ -430,8 +421,7 @@
 	crtlist_free_filters(entry->filters);
 	entry->filters = NULL;
 	ssl_sock_free_ssl_conf(entry->ssl_conf);
-	free(entry->ssl_conf);
-	entry->ssl_conf = NULL;
+	ha_free(&entry->ssl_conf);
 	return cfgerr;
 }
 
diff --git a/src/ssl_sock.c b/src/ssl_sock.c
index 83688af..a59b34d 100644
--- a/src/ssl_sock.c
+++ b/src/ssl_sock.c
@@ -2960,8 +2960,7 @@
 				/* it's a duplicate, we should remove and free it */
 				LIST_DEL(&sc0->by_ckch_inst);
 				SSL_CTX_free(sc0->ctx);
-				free(sc0);
-				sc0 = NULL;
+				ha_free(&sc0);
 				break;
 			}
 		}
@@ -4008,8 +4007,7 @@
 		HA_RWLOCK_RDUNLOCK(SSL_SERVER_LOCK, &s->ssl_ctx.lock);
 	} else {
 		HA_RWLOCK_RDLOCK(SSL_SERVER_LOCK, &s->ssl_ctx.lock);
-		free(s->ssl_ctx.reused_sess[tid].ptr);
-		s->ssl_ctx.reused_sess[tid].ptr = NULL;
+		ha_free(&s->ssl_ctx.reused_sess[tid].ptr);
 		HA_RWLOCK_RDUNLOCK(SSL_SERVER_LOCK, &s->ssl_ctx.lock);
 	}
 
@@ -5151,8 +5149,7 @@
 {
 	if (bind_conf->ca_sign_ckch) {
 		ssl_sock_free_cert_key_and_chain_contents(bind_conf->ca_sign_ckch);
-		free(bind_conf->ca_sign_ckch);
-		bind_conf->ca_sign_ckch = NULL;
+		ha_free(&bind_conf->ca_sign_ckch);
 	}
 }
 
@@ -5280,8 +5277,7 @@
 			SSL_SESSION *sess = d2i_SSL_SESSION(NULL, &ptr, __objt_server(conn->target)->ssl_ctx.reused_sess[tid].size);
 			if (sess && !SSL_set_session(ctx->ssl, sess)) {
 				SSL_SESSION_free(sess);
-				free(__objt_server(conn->target)->ssl_ctx.reused_sess[tid].ptr);
-				__objt_server(conn->target)->ssl_ctx.reused_sess[tid].ptr = NULL;
+				ha_free(&__objt_server(conn->target)->ssl_ctx.reused_sess[tid].ptr);
 			} else if (sess) {
 				SSL_SESSION_free(sess);
 			}
@@ -5676,10 +5672,8 @@
 		 * another thread */
 
 		HA_RWLOCK_RDLOCK(SSL_SERVER_LOCK, &s->ssl_ctx.lock);
-		if (s->ssl_ctx.reused_sess[tid].ptr) {
-			free(s->ssl_ctx.reused_sess[tid].ptr);
-			s->ssl_ctx.reused_sess[tid].ptr = NULL;
-		}
+		if (s->ssl_ctx.reused_sess[tid].ptr)
+			ha_free(&s->ssl_ctx.reused_sess[tid].ptr);
 		HA_RWLOCK_RDUNLOCK(SSL_SERVER_LOCK, &s->ssl_ctx.lock);
 	}
 
diff --git a/src/stats.c b/src/stats.c
index 53faee4..2c595fb 100644
--- a/src/stats.c
+++ b/src/stats.c
@@ -5064,8 +5064,7 @@
 	for (i = 0; i < STATS_DOMAIN_COUNT; ++i) {
 		const int domain = domains[i];
 
-		free(stat_l[domain]);
-		stat_l[domain] = NULL;
+		ha_free(&stat_l[domain]);
 	}
 }
 
diff --git a/src/stream.c b/src/stream.c
index b23754b..bb82761 100644
--- a/src/stream.c
+++ b/src/stream.c
@@ -672,7 +672,7 @@
 		__decl_thread(struct resolvers *resolvers = s->resolv_ctx.parent->arg.resolv.resolvers);
 
 		HA_SPIN_LOCK(DNS_LOCK, &resolvers->lock);
-		free(s->resolv_ctx.hostname_dn); s->resolv_ctx.hostname_dn = NULL;
+		ha_free(&s->resolv_ctx.hostname_dn);
 		s->resolv_ctx.hostname_dn_len = 0;
 		resolv_unlink_resolution(s->resolv_ctx.requester);
 		HA_SPIN_UNLOCK(DNS_LOCK, &resolvers->lock);
diff --git a/src/tcpcheck.c b/src/tcpcheck.c
index 82f7b02..ef9df24 100644
--- a/src/tcpcheck.c
+++ b/src/tcpcheck.c
@@ -3474,9 +3474,8 @@
 		goto out;
 	}
 
-	free(px->check_command);
-	free(px->check_path);
-	px->check_command = px->check_path = NULL;
+	ha_free(&px->check_command);
+	ha_free(&px->check_path);
 
 	if (!px->tcpcheck_rules.list) {
 		ha_alert("config : proxy '%s' : tcp-check configured but no ruleset defined.\n", px->id);
@@ -3546,10 +3545,8 @@
 	 * comment is assigned to the following rule(s).
 	 */
 	list_for_each_entry_safe(chk, back, px->tcpcheck_rules.list, list) {
-		if (chk->action != prev_action && prev_action != TCPCHK_ACT_COMMENT) {
-			free(comment);
-			comment = NULL;
-		}
+		if (chk->action != prev_action && prev_action != TCPCHK_ACT_COMMENT)
+			ha_free(&comment);
 
 		prev_action = chk->action;
 		switch (chk->action) {
@@ -3564,8 +3561,7 @@
 				chk->comment = strdup(comment);
 			/* fall through */
 		case TCPCHK_ACT_ACTION_KW:
-			free(comment);
-			comment = NULL;
+			ha_free(&comment);
 			break;
 		case TCPCHK_ACT_SEND:
 		case TCPCHK_ACT_EXPECT:
@@ -3574,8 +3570,7 @@
 			break;
 		}
 	}
-	free(comment);
-	comment = NULL;
+	ha_free(&comment);
 
   out:
 	return ret;
@@ -4864,8 +4859,7 @@
 	if (errmsg) {
 		ha_warning("parsing [%s:%d]: '%s %s' : %s\n", file, line, args[0], args[1], errmsg);
 		err_code |= ERR_WARN;
-		free(errmsg);
-		errmsg = NULL;
+		ha_free(&errmsg);
 	}
 
   no_request:
diff --git a/src/tools.c b/src/tools.c
index 82e1063..1c43354 100644
--- a/src/tools.c
+++ b/src/tools.c
@@ -2464,10 +2464,8 @@
 
 bad_input:
 	memprintf(err, "an hex digit is expected (found '%c')", p[i-1]);
-	if (alloc) {
-		free(*binstr);
-		*binstr = NULL;
-	}
+	if (alloc)
+		ha_free(binstr);
 	return 0;
 }
 
@@ -3957,8 +3955,7 @@
 
 	if (needed < 0) {
 		/* an error was encountered */
-		free(ret);
-		ret = NULL;
+		ha_free(&ret);
 	}
 
 	if (out) {
diff --git a/src/wurfl.c b/src/wurfl.c
index 34075d6..02e1dd4 100644
--- a/src/wurfl.c
+++ b/src/wurfl.c
@@ -406,10 +406,8 @@
 	send_log(NULL, LOG_NOTICE, "WURFL: Unloading module v.%s\n", HA_WURFL_MODULE_VERSION);
 	wurfl_destroy(global_wurfl.handle);
 	global_wurfl.handle = NULL;
-	free(global_wurfl.data_file);
-	global_wurfl.data_file = NULL;
-	free(global_wurfl.cache_size);
-	global_wurfl.cache_size = NULL;
+	ha_free(&global_wurfl.data_file);
+	ha_free(&global_wurfl.cache_size);
 
 	list_for_each_entry_safe(wi, wi2, &global_wurfl.information_list, list) {
 		LIST_DEL(&wi->list);
diff --git a/src/xprt_quic.c b/src/xprt_quic.c
index f8e807c..57c910f 100644
--- a/src/xprt_quic.c
+++ b/src/xprt_quic.c
@@ -2342,8 +2342,7 @@
 			qel->tx.crypto.bufs[i] = NULL;
 		}
 	}
-	free(qel->tx.crypto.bufs);
-	qel->tx.crypto.bufs = NULL;
+	ha_free(&qel->tx.crypto.bufs);
 }
 
 /* Initialize QUIC TLS encryption level with <level<> as level for <qc> QUIC
@@ -2384,8 +2383,7 @@
 	return 1;
 
  err:
-	free(qel->tx.crypto.bufs);
-	qel->tx.crypto.bufs = NULL;
+	ha_free(&qel->tx.crypto.bufs);
 	return 0;
 }
 
@@ -2405,10 +2403,8 @@
 			p++;
 			continue;
 		}
-		free((*p)->area);
-		(*p)->area = NULL;
-		free(*p);
-		*p = NULL;
+		ha_free(&(*p)->area);
+		ha_free(p);
 		p++;
 	}
 	free(bufs);